Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.symantec.com/avcenter/security/Content/2008.02.20a.html | patch |
http://securitytracker.com/id?1019459 | vdb entry |
http://secunia.com/advisories/29050 | third party advisory |
http://www.securityfocus.com/bid/25778 | vdb entry patch |
http://www.zerodayinitiative.com/advisories/ZDI-08-007.html | |
http://www.securityfocus.com/archive/1/488420/100/0/threaded | mailing list |